Advanced Computing in the Age of AI | Friday, March 29, 2024

Briefing Says Increasingly Aggressive Malware Is Driving IT Professionals to Re-Examine Backup Strategies and Solutions 

TORONTO, April 4, 2018 -- Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today highlighted the 2018 Breach Briefing(1), a new report by Beazley Breach Response (BBR) Services which found that the threat from ransomware is far from over. In defense of business continuity across all impacted industries, Asigra is calling for organizations to review their backup policies and double down on redundancy so that multiple remote copies of mission critical backups are available when the next attack occurs.

According to BBR Services, “Ransomware remained a constant threat in 2017, including two notable worldwide attacks. BBR Services saw an 18% increase in ransomware incidents in 2017, and ransomware attacks are still occurring across industries and market segments. And while BBR Services received more notifications of ransomware attacks from smaller companies, notifications from larger companies in the middle market still accounted for 42% of the 2017 ransomware attacks.”(2)

Data protection specialists agree that the number one strategy for recovering data lost to criminal encryption is through a reliable data recovery strategy. However, with strands of ransomware now targeting backup data, organizations must take extra steps to ensure their backup data is clean before conducting a recovery. Regardless of the backup platform used, a redundant data protection strategy should be employed to ensure an effective recovery. This approach requires that multiple copies of the company’s mission critical data are created. These backup sets should be stored on multiple media formats, such as secondary disk storage or the cloud with at least one of the backup data sets stored in an offsite location. Once in place, data policies should also be enhanced to include more regular test recoveries to determine the effectiveness, quality and speed of the recovery.

To avoid Ransomware or other malware variants entering your network(s) in the first place, the report  revealed a number of actions that organizations should take immediately to protect their IT systems against attacks, including:

•       Training employees on the indicators of ransomware and malware, how to identify phishing emails, and how to report suspected incidents;
•       Keeping systems up to date and patch as soon as possible;
•       Enabling automated patching for operating systems and browsers;
•       Segregating networks based on functionality and the need to access resources, including physical or virtual separation of sensitive information;
•       Limiting unnecessary lateral communications within the network;
•       Managing the use of privileged accounts. Implementing the principle of “least privilege.” No users should be assigned administrative access unless absolutely needed. Those with a need should only use them when necessary. Additionally, organizations should limit the use of administrative shares;
•       Configuring access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access;
•       Hardening network devices with secure configurations, including disabling unnecessary services and remote administration protocols. Always change default passwords;
•       Taking advantage of threat intelligence resources including alerts from US-CERT and information provided by regulators for your industry, such as the Health and Human Services (HHS) Office of Civil Rights Privacy and Security listserv, and
•       Requiring two-factor authentication for external access to all applications.

As organizations called on their backup sets to recover data that was encrypted by ransomware, the entities behind such attacks have made headway in seeking out and infecting backup data. This has resulted in a recovery attack-loop that re-introduces time-delayed, undetected ransomware onto the network from the backup data. This has negatively impacted recovery for many organizations as it renders the recovery of encrypted files useless, allowing the malware to re-constitute and re-encrypt the primary data again. Therefore, defending recovery data from such attacks using a redundant backup strategy is key as is the deployment of an evolved data protection solution that offers a robust recovery framework.

“Backup and recovery has become recognized as the last line of defense in the continued operation of a business after a crippling malware attack occurs,” said Eran Farajun, Executive Vice President, Asigra. “By taking the necessary steps to tighten security and conducting a review of one’s backup strategy and policies, recovery readiness can be assured for the next round of attacks.”

Additional Resources:
•       Hear what Solution Providers have to say about working with Asigra: http://www.asigra.com/resource-center/partner-testimonials
•       Users Name Asigra as Top Enterprise Backup Solution - Storage Magazine: http://www.asigra.com/about-asigra/press-releases/asigra-outscores-rivals-win-techtarget-2015-quality-award
•       Read Asigra Product Reviews: http://www.asigra.com/product/product-reviews
•       Follow Asigra on Twitter at: http://twitter.com/asigra
•       The 2016 Partner Program Guide will be featured in the April issue of CRN and online at www.CRN.com/ppg2016.
•       Follow The Channel Company: Twitter, LinkedIn and Facebook

About Asigra

Trusted since 1986, Asigra provides organizations around the world the ability to recover their data now from anywhere through a global network of partners who deliver cloud backup and recovery services as public, private and/or hybrid deployments. As the industry’s first enterprise-class agentless cloud-based recovery software to provide data backup and recovery of servers, virtual machines, endpoint devices, databases and applications, SaaS and IaaS based applications, Asigra lowers the total cost of ownership, reduces recovery time objectives, eliminates silos of backup data by providing a single consolidated repository, and provides 100% recovery assurance. Asigra’s revolutionary patent-pending Recovery License Model provides organizations with a cost-effective data recovery business model unlike any other offered in the storage market. Asigra has been recognized as a Gartner Cool Vendor and has been included in the Gartner Magic Quadrant for Enterprise Backup and Recovery Software since 2010. More information on Asigra can be found at www.asigra.com.


Source: Asigra

EnterpriseAI